|
Phishing
|
Rachel Lininger |
"Phishing" is the hot new identity theft scam. An unsuspecting victim receives an e-mail that seems to come from a bank or other financial institution, and it contains a link to a Web site where s/he… |
OL13543590W |
|
The web application hacker's handbook
|
Dafydd Stuttard,Dafydd Stuttard |
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code ex… |
OL13814659W |
|
Internet Visual Quick Tips
|
Kate Shoup |
Would you like to browse the Web incognito, boost your system's performance, get more out of Google, and enjoy all the cool ways to social network? Then this Visual Quick Tips book is for you. This b… |
OL15176310W |
|
Mastering Web Services Security
|
Bret Hartman |
Uncovers the steps software architects and developers will need to take in order to plan and build a real-world, secure Web services system Authors are leading security experts involved in developin… |
OL15178068W |
|
The death of the Internet
|
Markus Jakobsson |
"Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affec… |
OL16318634W |
|
Privacy in the Age of Big Data
|
Theresa M. Payton,Theodore Claypoole |
Digital data collection and surveillance gets more pervasive and invasive by the day; but the best ways to protect yourself and your data are all steps you can take yourself. The devices we use to ge… |
OL17047064W |
|
Click here to kill everybody
|
Bruce Schneier |
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading sys… |
OL18202400W |
|
Securing the information infrastructure
|
Joseph Migga Kizza |
"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence t… |
OL1911927W |
|
Privacy in the age of big data
|
Theresa Payton |
Highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. |
OL19671007W |
|
Security and Privacy Protection in Information Processing Systems
|
Lech J. Janczewski |
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised … |
OL19901287W |
|
The smart girl's guide to privacy
|
Violet Blue |
"Discusses how to protect personal information from online privacy violations. Covers how to set and store secure passwords, monitor online visibility, safely use social media and apps, and create on… |
OL20006516W |
|
WHOIS running the Internet
|
Garth O. Bruen |
"This book provides a comprehensive overview of WHOIS. The text begins with an introduction to WHOIS and an in-depth coverage of its forty-year history. Afterwards it examines how to use WHOIS and ho… |
OL20025997W |
|
Your right to privacy
|
Jim Bronskill |
"Hacking, snooping and invading are commonplace on the Internet. Your personal information can be seen and shared and your privacy can be violated. Two veteran journalists, authorities on how informa… |
OL20034918W |
|
E-Business Privacy and Trust
|
Shaw, Paul |
Protect your customers-and your business-with these essential "rules of the road" for maintaining Web site security Any company planning to do business on the Internet today must first become fully… |
OL2716455W |
|
Tangled web
|
Power, Richard |
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them m… |
OL848484W |
|
The Future of the Internet-And How to Stop It
|
Jonathan L. Zittrain |
This extraordinary book explains the engine that has catapulted the Internet from backwater to ubiquity—and reveals that it is sputtering precisely because of its runaway success. With the unwitting … |
OL9381421W |